Select an excellent route to form a high-quality network instance

Source: Internet
Author: User
Tags passthrough

This article describes in detail how to select an excellent router for networking in terms of management technology, software features, network security features, wireless features, and data processing.

Easy to manage

After the driver is installed, you can enter the software control interface. Enter 192.168.1.1 in the address bar to display the Login Dialog Box. WBR604g uses a fully-Chinese configuration environment, which is configured and managed on the WEB interface. Provides the quick setting and setting wizard functions. You only need to perform simple operations to complete simultaneous Internet access for multiple computers. The unique wireless security and simple setting function makes it easy to enjoy wireless and secure Internet access.
You can see from the instruction manual that the default administrator login name and password are "admin ". In the displayed dialog box, enter the default Administrator account and password to go to the configuration page. In the network properties, set the IP address of the wireless network adapter to 192.168.1.2 and the subnet mask to 255.255.255.0 so that the IP address remains in the same network segment as the wireless network node. Generally, the wireless network nodes that are not configured are not encrypted. During connection, you may be prompted "whether to connect to an insecure wireless network ". First confirm the connection, and then perform security encryption after the wireless LAN connection is successful. After a normal connection, the current signal strength is displayed in the network properties.

Software features

The vro supports NATP, UPnP, DHCP, PPPoE, PPTP, DNS, DDNS dynamic domain name resolution, Static Routing, NTP (network time), and other functions; supports multiple IPSec and PPTP/L2TP (pass-through) passthrough connections, allowing multiple users to access the enterprise network more securely through multiple VPN clients.
Here I use ADSL virtual dial PPPOE) for connection. Enter the ADSL account and password. When applying for the ADSL virtual dialing service, the network service provider will provide you with an internet account and a password. Enter the corresponding input box. If you accidentally forget or do not know how to fill it out, please contact your network service provider. After entering the information, click "OK" to complete the dialing settings.
Of course, you can also select the dynamic IP connection mode, as long as you set the IP address of the wireless network node to dynamic acquisition. After setting, save the setting and restart the vro.

Network security features

Although we have achieved broadband sharing through the above Wireless LAN, It is very insecure. Please do not forget that if a wireless network card is installed on your computer near you, you can intrude into your wireless LAN without knowing it, or even use your broadband to access the Internet. As an enterprise, it is naturally the first in security. To ensure the security of the wireless network, the WBR604g router has powerful network security encryption settings. Supports SPI connection-based status packet detection firewall, DoS attack protection, DoS attack protection, and intrusion detection. Supports IPSec, PPTP, and L2TP VPN passthrough. Wireless authentication and encryption support WPA, WPA2, WAP-PSK, WPA2-PSK, WEP and AES, TKIP standards, truly effective protection of network security.
First, you must modify the default password of the wireless router, which is usually admin or empty. In the Security Settings column, find the Change Password to change the default password of the wireless router.
The WPA-Preshared key is a safe way to protect your data. Through its encryption, each data packet transmitted between your wireless router and your wireless network adapter will be packaged and encapsulated by a different key. This means that even if someone intercepts your data packets and cracks the encrypted string, they cannot read other data parts. Because the same encrypted string duplication is unlikely. The specific settings are as follows. In the Security Settings column, select to enable the WEP encryption function, and enter a hexadecimal character that must be 0-9 or a-f) as the encryption string, usually 64-bit encryption requires a 10-digit string, while 128-bit encryption requires a 26-digit string. The AES encryption algorithm is recommended by the author, because AES uses 128-bit, 192-bit, and 256-bit keys to obtain the best security.
Save the settings and restart the wireless router.

Wireless features

The wireless LAN must support high-speed and burst data services. During indoor use, it must solve problems such as multi-path fading and crosstalk between adjacent subnets. However, WBR604g uses the Extended Spectrum Technology. Mobile Terminals can access the Internet through wireless access points. In addition, they can configure MAC bridging AP and allow wireless client access; the working mode is divided into AP + NAT and pure AP modes, allowing you to flexibly set up your own wireless network.
The function of a wireless network node is to convert the signal of a wired network into a wireless signal. Its position determines the signal strength and transmission rate of the entire wireless network. The position of the router is very important. Generally, in order to pursue a stable and efficient network environment, we must follow the following router placement features.
First, because wireless signals are transmitted in a straight line, if there are obstacles in the middle, wireless signals will be weakened. Therefore, the location of the Wireless AP should be relatively high.
Second, do not wear too many walls between Wireless AP and LAN computers, especially reinforced concrete walls. This will greatly weaken the intensity of wireless signals.
Third, the Wireless AP should be located in the center of the work or use location. Because the Wireless AP coverage is a circular area. The closer the AP is to the Wireless AP, the stronger the wireless signal, and the greater the anti-interference capability, the higher the transmission rate.
In short, routers should be placed in relatively high places and placed in the center of the computer as much as possible. Concrete walls can be said to be a major obstacle to wireless routing, the original strong network signal quality is poor after passing through several walls, so try to avoid the placement of multi-layer walls. This completes the installation process.

Data processing performance

WBR604g uses a high-performance processor with outstanding throughput and strong load capabilities. Based on advanced Afterburner technology, WBR604g achieves a wireless transmission rate of up to 125 MB, it fully guarantees the quality of real-time applications through wireless networks, such as voice, video applications, online movies, and online games ).
However, it is not enough to have a high-performance router. We also need to set the NIC. In the wireless Nic attribute bar, set the subnet mask to 255.255.255.0. The IP address must be in the same CIDR block as the wireless router. Select "wireless network configuration", click "properties", and check "enable data encryption WEP, enter the encrypted string in the "Network key" and "Confirm network key" columns below, and click "OK. In this way, the wireless network card can be correctly connected to the wireless router.

Summary

WBR604g is mainly used to share a broadband Internet access account with multiple computers in families and small and medium-sized enterprises. With four LAN ports and a WLAN port, you can share the Internet with both wired and wireless networks. On the WBR604g interface, you can filter MAC addresses, IP addresses, and external site addresses of the LAN port host. In addition, WBR604g supports URL filtering to restrict poor WEB browsing and support time filtering, you can control the Internet access time of computers in the LAN. In addition, WBR604g supports Virtual Server settings. with dynamic domain names, enterprises can easily configure their own WWW and FTP servers.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.